During congressional testimony, cybersecurity firm FireEye pushed for greater liability protections to be included in a draft cyber incident reporting bill. Rep. John Katko, R-N.Y., plans...
In the wake of the Colonial Pipeline cyberattack and an ensuing Executive Order, a renewed focus is being given to the strength and resiliency of our...
A memo for agencies assigns criticality levels to monitoring activities along various categories and sets deadlines for compliance. Federal agencies must immediately begin sharing any relevant...
Fraudsters send out texts or emails falsely warning that the target’s license needs to be updated, is missing information or is expiring. After the COVID-19 pandemic...
Language from the House Armed Services’ cybersecurity subcommittee also proposes testing for non-kinetic attacks, and the creation of an inventory toward ending the use of legacy...
The Cybersecurity and Infrastructure Security Agency shared an FBI flash report on the group which provides insight into the extent of the ransomware business ecosystem. Federal...
ShinyHunters, a financially motivated threat group that emerged in May 2020, has made their return to push a trove of data allegedly stolen from U.S. telecommunications...
Cybercriminals behind the BazaLoader malware came up with a new lure to trick website owners into opening malicious files: fake notifications about the site being engaged...
Government organizations have been a steady target of distributed denial-of-service attacks. Distributed denial-of-service attacks have steadily increased over the last 18 months, despite being overshadowed by...
Local election officials are on the front lines of election defense, but they often are underfunded or lack the technical knowhow to protect systems from cyber...